Solved

java and SSL with Tomcat - Keystore was tampered with, or password was incorrect

Posted on 2004-10-04
3
3,170 Views
Last Modified: 2013-11-24
Hi,

I've just created all key store and certificates for ssl with tomcat. When i try to run my client i'm getting the following error

Oct 4, 2004 5:02:19 PM org.apache.catalina.startup.Catalina start
SEVERE: Catalina.start:
LifecycleException:  Protocol handler start failed: java.io.IOException: Keystore was tampered with, or password was incorrect
      at org.apache.coyote.tomcat5.CoyoteConnector.start(CoyoteConnector.java:1529)
      at org.apache.catalina.core.StandardService.start(StandardService.java:489)
      at org.apache.catalina.core.StandardServer.start(StandardServer.java:2313)
      at org.apache.catalina.startup.Catalina.start(Catalina.java:556)
      at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
      at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
      at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
      at java.lang.reflect.Method.invoke(Method.java:324)
      at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:284)
      at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:422)
Oct 4, 2004 5:02:19 PM org.apache.catalina.startup.Catalina start
INFO: Server startup in 12041 ms

I've double checked my code and the password is correct so if anyone has any ideas what else could be the problem and how to fix it  please let me know.

Thanks,
Suzy
0
Comment
Question by:fyness
3 Comments
 
LVL 6

Accepted Solution

by:
dorothy2 earned 125 total points
Comment Utility
(1) You can use keytool to list the keys in the keystore. I can't remember whether it lists the password as one of  the attributes. I would try to independently verify the password.

(2) Unfortunately, it may take less time to blow away the keystore and recreate it and the keys than to puzzle over the error. I would recommend that you use a batch file or Java to create the keys rather than doing it interactively; that way you have a means of looking back at exactly what was entered.

Good luck,

Dorothy
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
ArrayLists in ArrayLists/HashMaps? 4 39
json example 39 110
mapAB Challlenge 35 84
GUI builder for Eclipse? 8 7
For beginner Java programmers or at least those new to the Eclipse IDE, the following tutorial will show some (four) ways in which you can import your Java projects to your Eclipse workbench. Introduction While learning Java can be done with…
This was posted to the Netbeans forum a Feb, 2010 and I also sent it to Verisign. Who didn't help much in my struggles to get my application signed. ------------------------- Start The idea here is to target your cell phones with the correct…
Viewers learn about the “for” loop and how it works in Java. By comparing it to the while loop learned before, viewers can make the transition easily. You will learn about the formatting of the for loop as we write a program that prints even numbers…
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now